Sciweavers

21 search results - page 4 / 5
» A Three Rounds Property of the AES
Sort
View
87
Voted
SPW
2004
Springer
15 years 3 months ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
80
Voted
CSE
2009
IEEE
15 years 5 months ago
A Lightweight Architecture for Secure Two-Party Mobile Payment
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP,...
Yunpu Zhu, Jacqueline E. Rice
125
Voted
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
15 years 3 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
102
Voted
EWSN
2004
Springer
15 years 9 months ago
ACE: An Emergent Algorithm for Highly Uniform Cluster Formation
The efficient subdivision of a sensor network into uniform, mostly non-overlapping clusters of physically close nodes is an important building block in the design of efficient uppe...
Haowen Chan, Adrian Perrig
115
Voted
MUE
2007
IEEE
149views Multimedia» more  MUE 2007»
15 years 4 months ago
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission
Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication ...
Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam